DISTRIBUTED COMPUTING SYSTEM AND METHOD

The invention relates to distributed processing systems that involve the distribution of computational tasks to one or more untrusted worker computer systems. When an untrusted worker computer system performs a calculation on behalf of a requesting computer system, the requesting computer system (or other verifying computer system) is provided with information that allows the requesting computer system to cryptographically verify that that task has been correctly completed. After completing the calculation, the worker computer system provides information to the requester that includes a proof and I/O data. The requesting computer system may use a set of public verification key parameters, the proof, and the I/O data to verify that the computation performed by an untrusted worker computer system is correct. In some examples, the calculation performed by the worker is associated with the verification of a blockchain transaction. For example, the verification of the computation performed by the untrusted worker computer system may occur as part of validating a transaction on a blockchain node.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description
FIELD OF INVENTION

This invention relates generally to the operation of distributed computing systems, and more particularly to methods and systems for cryptographically verifying the correct completion of computing tasks that are distributed to and performed by a third party computer system. Some embodiments of the invention may be particularly suited, but not limited to, use in blockchain systems.

BACKGROUND OF INVENTION

In this document the term “blockchain” refers to any of several types of electronic, computer-based, distributed ledgers. These include consensus-based blockchain and transaction-chain technologies, permissioned and unpermissioned ledgers, shared ledgers and variations thereof. The most widely known application of blockchain technology is the Bitcoin ledger, although other blockchain implementations have been proposed and developed. While the example of Bitcoin may be referred to in the present disclosure, for the purpose of convenience and illustration, it should be noted that the invention is not limited to use with the Bitcoin blockchain, and alternative blockchain implementations and protocols fall within the scope of the present invention. For example, the invention can be useful in other blockchain implementations that have limitations similar to Bitcoin regarding what constraints can be encoded within transactions.

A blockchain is a peer-to-peer, electronic ledger that is implemented as a computer-based decentralised, distributed system made up of blocks, which, in turn, are made up of transactions and other information. For example, with Bitcoin, each transaction is a data structure that encodes the transfer of control of a digital asset between participants in the blockchain system, and includes at least one input and at least one output. In some embodiments, a “digital asset” refers to binary data that is associated with a right to use. Examples of digital assets include Bitcoin, ether, and Litecoins. In some implementations, transferring control of a digital asset can be performed by reassociating at least a portion of a digital asset from a first entity to a second entity. Each block contains a hash of the previous block so that blocks become chained together to create a permanent, immutable record of all transactions that have been written to the blockchain since its inception.

Transactions contain small programs known as scripts embedded into their inputs and outputs that specify how and by whom the outputs of the transactions can be accessed. On the Bitcoin platform, these scripts are written using a stack-based scripting language.

In general, before transaction is written to the blockchain, the transaction is “validated”. Network nodes (miners) perform work to ensure that each transaction is valid, with invalid transactions rejected from the network. A node can have standards for validity different from other nodes. Because validity in the blockchain is consensus based, a transaction is considered valid if a majority of nodes agree that a transaction is valid. Software clients installed on the nodes perform this validation work on transactions referencing an unspent transaction (UTXO) in part by executing the UTXO locking and unlocking scripts. If execution of the locking and unlocking scripts evaluates to TRUE and other validation conditions, if applicable, are met, the transaction is validated by the node. The validated transaction is propagated to other network nodes, whereupon a miner node can select to include the transaction in a blockchain. Thus, in order for a transaction to be written to the blockchain, it must be i) validated by the first node that receives the transaction—if the transaction is validated, the node relays it to the other nodes in the network; and ii) added to a new block built by a miner; and iii) mined, i.e., added to the public ledger of past transactions. The transaction is considered to be confirmed when a sufficient number of blocks is added to the blockchain to make the transaction practically irreversible.

Although blockchain technology is most widely known for the use of cryptocurrency implementation, digital entrepreneurs have begun exploring the use of both the cryptographic security system Bitcoin is based on and the data that can be stored on the blockchain to implement new systems. It would be highly advantageous if the blockchain could be used for automated tasks and processes which are not limited to the realm of cryptocurrency. Such solutions would be able to harness the benefits of the blockchain (e.g., a permanent, tamper proof records of events, distributed processing etc.) while being more versatile in their applications.

One area of current research is the use of the blockchain for the implementation of “smart contracts”. Smart contracts are computer-implemented systems that automate the execution and/or confirmation of the terms of a contract or agreement stored in a machine-readable format. Unlike a traditional contract which would be written in natural language, a smart contract is a machine-readable description of terms and conditions that can be processed by a computer system to produce results, which can then cause actions to be performed dependent upon those results.

Another area of blockchain-related interest is the use of ‘tokens’ (or ‘coloured coins’) to represent the transfer of real-world entities via the blockchain. A potentially sensitive or secret item can be represented by the token which has no discernable meaning or value. The token thus serves as an identifier that allows the real-world item to be referenced from the blockchain.

In embodiments, a smart contract is “smart” in the sense that the creator, or some other specific entity, is not tasked with enforcement and/or execution of the smart contract. That is, although interaction with specific entities can be encoded at specific steps in the smart contract, the smart contract can otherwise be automatically executed and self-enforced. It is machine readable and executable. In some examples, automatic execution refers to any entity being able to unlock the UTXO and having an incentive (e.g., reward) to do so. Note that in such examples, the “any entity” that is able to unlock the UTXO refers to an entity that is able to create the unlocking script without being required to prove knowledge of some secret. In other words, the unlocking transaction can be validated without verifying that the source of the data has access to a cryptographic secret (e.g., private asymmetric key, symmetric key, etc.). Also, in such examples, self-enforcement refers to the validation nodes of the blockchain network being caused to enforce the unlocking transaction according to the constraints. In some examples, “unlocking” a UTXO refers to creating an unlocking transaction that references the UTXO and executes as valid. This may sometimes be referred to as “spending” the transaction.

A blockchain transaction output includes a locking script and information regarding ownership of digital assets such as Bitcoins. The locking script, which may also be referred to as an encumbrance, “locks” the digital assets by specifying conditions that are required to be met in order to unlock the output. For example, a locking script could require that certain data be provided in an unlocking script to unlock the associated digital assets. The locking script is also known as “scriptPubKey” in Bitcoin. A technique for requiring a party to provide data to unlock a digital asset involves embedding a hash of the data inside the locking script. However, this presents a problem if the data is undetermined (e.g., not known and fixed) at the time the locking script is created.

SUMMARY OF INVENTION

Thus, it is desirable to provide methods and systems that improve distributed computing systems in one or more of these aspects. Such an improved solution has now been devised.

Thus, in accordance with the present invention there is provided a method as defined in the appended claims.

Thus, it is desirable to provide a computer-implemented method, the computer-implemented method comprising providing a task to a set of independent computer systems which are able to compete to provide the outcome of the provided task, the task specifying a computation to perform, and verifying, at a verifying computer system, that the computation is correctly performed by a worker computer system in the set of independent computer systems, the computation based on a circuit having a set of multiplication gates, by at least: generating an evaluation key; providing the evaluation key to the worker computer system; receiving a proof from the worker computer system, the proof based at least in part on the evaluation key; and generating a verification key; and verifying that the computation is correct using the proof and the verification key.

The verification key may be based on one or more of the inputs to the set of multiplication gates and the outputs of the set of multiplication gates. In an embodiment, the verification key is a public verification key, and the public verification key may be published by a computer system.

The proof may be based at least in part on a set of intermediate outputs of the multiplication gates. In an embodiment, the set of intermediate outputs excludes the final output of the circuit.

The proof may be based at least in part on a public evaluation key.

The proof and the verification key may be based at least in part on a first generator and a second generator that generate different groups.

Preferably, the method may also include verifying that elements of the proof are consistent with elements of the evaluation key. In an embodiment, the evaluation key may be determined as follows, where i represents the index to the internal wires of the circuit, deg(t) is the degree of the polynomial t(x), and deg(t) is equal to the number of multiplication gates in the circuit.:

Public Evaluation Key E K = { r v v i ( s ) α v r v v i ( s ) r w w i ( s ) α w r w w i ( s ) r y y i ( s ) α y r y y i ( s ) ( r v β v i ( s ) + r w β w i ( s ) + r y β y i ( s ) ) s j } i = N + 1 m j = 0 deg ( t )

Preferably, the method may also include verifying that the elements of the proof are constructed using matching coefficients. In an embodiment, matching coefficients are confirmed for Vmid(s)P, Wmid(s)Q and Ymid(s)P as follows:


e(rvVmid(s)+ryYmid(s), βQe(β, rwWmid(s)Q)=e(Zmid(s), Q)

    • and Zmid(s)=Σi=N+1mai(rvβvi(s)+rwβwi(s)+ryβYi(s)).

Preferably, the method may also include verifying a divisibility requirement on a term of the proof In an embodiment, a verifying entity confirms that the divisibility requirement is satisfied by confirming that:


e(rvV(s), rwW(s)Q)=e(ryY(s), Qe(ryt(s), h(s)Q)   [5]

    • where rvV(s)=Σi=0mrvrvaivi(s), rwW(s)Q=Σi=0mrwrwaiw(s)Q, ryY(s)=Σi=0mryaiy(s), and h(s)Q=Σi=0dhiQ.

The worker computer system may provide a set of I/O values corresponding to input and output values of the circuit. In an embodiment, the I/O data is the input and outputs of a function being evaluated by the worker computer system.

The circuit may include one or more addition gates which are modelled with their contributions to the multiplication gates. In an embodiment, the circuit can be viewed as a set of multiplication and addition gates where the circuit contains m wires connected to d multiplication gates, and addition gates are modelled with their contributions to the multiplication gates.

The computation may be part of a bitcoin transaction validation or, in additional embodiments, the computations may be part of a blockchain transaction validation.

Verifying that the computation is correct may be accomplished by at least providing the proof, the verification key, and a set of I/O values to a verification computer system, and receiving an indication from the verification computer system that the computation is correct. In an embodiment, the indication may be a cryptographically verifiable indication that the computation is correct such as a digital signature generated with a key associated with the verification computer system.

The verification computer system may be a blockchain node or a bitcoin node.

It is also desirable to provide a system, comprising: a processor; and memory including executable instructions that, as a result of execution by the processor, causes the system to perform any of the methods as claimed.

It is also desirable to provide a non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of execution by one or more processors of a computer system, cause the computer system to at least perform any of the methods as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other aspects of the present invention will be apparent from and elucidated with reference to, the embodiment described herein. An embodiment of the present invention will now be described, by way of example only and with reference to the accompanying drawings, in which:

FIG. 1 illustrates a blockchain environment in which various embodiments can be implemented;

FIG. 2 is a swim diagram that illustrates an example of a process that, if performed by a client computer system and a worker computer system, allows the client to verify work performed by the worker using a proof it and the Verification Key VK in accordance with an embodiment;

FIG. 3 illustrates an example of a circuit that represents an arithmetic function in accordance with an embodiment;

FIG. 4 is a flowchart that illustrates an example of a process that, if performed by a client computer system, determines a verification key VK in accordance with an embodiment;

FIG. 5 is a flowchart that illustrates an example of a process that, if performed by a client computer system, verifies a computation performed by a worker computer system using Proof π in accordance with an embodiment; and

FIG. 6 illustrates a computing environment in which various embodiments can be implemented.

DETAILED DESCRIPTION

In a distributed computing environment, a single task may be divided into a plurality of sub-tasks, which may be distributed amongst a plurality of computer systems for execution. Each of the plurality of computer systems may perform one or more of the sub-tasks. In various examples, the results produced by the individual computer systems are accumulated and aggregated by a coordinating computer system to produce a result for the original single task. Therefore, in many embodiments, the coordinating computer system has an interest in determining that each of the sub-tasks is correctly executed so that the result produced for the original single task is correct. This is particularly problematic if the individual computer systems to which the sub-tasks are distributed are not entirely trusted by the coordinating computer system. The system and method described in the present document allows a verifying computer system to cryptographically verify the work performed by another computer system, even though the other computer system may be an un-trusted computer system. This allows the coordinating computer system to distribute work to a broader set of computer systems that are not necessarily trusted, since the work produced can be cryptographically verified without reproducing the distributed sub-tasks.

The present document describes the process by which the work of an untrusted worker computer system may be verified by way of various examples. In some embodiments, the work distributed to the worker computer system can be viewed as a portion of a logical circuit, and verifying the work associated with some or all of that circuit allows a verifier to proceed with other subtasks related to the logical circuit. In some implementations, information related to the performance and verification of the subtasks is exchanged using a blockchain. However, the methods described herein are applicable to any distributed computing environment where a verifying entity is required to confirm the work performed by one or more un-trusted computer systems.

The following notations may be used in the present document. Mathematical groups may be represented using double-struck letter, e.g. 1, and group generators may be denoted by script letters, e.g. . For example, given a group 1, if =G1 we may recite that generates 1.

Double-struck letters may be used to represent fields. For example, p may be used to represent the finite field of characteristic p and pk may be used to denote the extension field of degree k of p where k is a non-zero integer. The subset \{0} consisting of non-zero elements may be written as *. In another example, for a prime number p, p={0,1,2, . . . p−2, p −1} and p*={1,2, . . . , p −2, p −1}. In another example where E is an elliptic curve over the finite field p (resp. pk), an abelian subgroup of order r of E(p)[r] (resp. E(pk)[r]) may be written as E(p)[r] (resp. E(pk)[r]). An element x being sampled at random from a set X may be represented as

The notation e: 1×2T may be used to represent an efficient computable bilinear map where 1, 2, and T are cyclic groups of the same prime order r. 1 and 2 are additive groups, T is a multiplicative group. Arithmetic operations are performed modulo r.

The present document describes one or more embodiments that make use of a Quadratic Arithmetic Program (“QAP”). In various embodiments, general computations are encoded over a field of prime order r, into a set of polynomial operations. In an example, a QAP contains a tuple=({vi}i=0m, {w}i=0m, {y}i=0m, t) , with vi, wi, yl, t ∈ r[x] polynomials of degree deg(vi) , deg(wi) , deg(yl)<deg(t)=d. In reference to the previous example, the QAP may be described by reciting that the size of Q is m (m representing the number of internal wires), and that the degree of Q is the degree d of t, where d is the number of multiplication gates. In another example, let Q=({vi}i=0m, {wi}i=0m, {yi}i=0m, t) be a QAP. A tuple (a0, . . . , am) is a solution of Q if t divides (Σi=0m,(x))·(Σi=0maiwi(x))−(Σi=0maiyi(x)) ∈r[x]. The polynomials {vi}i=0m encode the left input into each multiplication gate, the polynomials {wi}i=0m encode the right input into each multiplication gate, and the polynomial {yi}i=0m encodes the outputs.

Reference will first be made to FIG. 1, which illustrates an example blockchain network 100 associated with a blockchain in accordance with an embodiment of the present disclosure. In the embodiment, the example blockchain network 100 comprises blockchain nodes that are implemented as peer-to-peer distributed electronic devices, each running an instance of software and/or hardware that performs operations that follow a blockchain protocol that is, at least in part, agreed to among operators of nodes 102. In some examples, “nodes” refers to peer-to-peer electronic devices that are distributed among the blockchain network. An example of a blockchain protocol is the Bitcoin protocol.

In some embodiments, the nodes 102 can be comprised of any suitable computing device (e.g., by a server in a data centre, by a client computing device (e.g., a desktop computer, laptop computer, tablet computer, smartphone, etc.), by multiple computing devices in a distributed system of a computing resource service provider, or by any suitable electronic client device such as the computing-device 600 of FIG. 6). In some embodiments, the nodes 102 have inputs to receive data messages or objects representative of proposed transactions, such as a transaction 104. The nodes, in some embodiments, are be queryable for information they maintain, such as for information of a state of the transaction 104.

As shown in FIG. 1, some of the nodes 102 are communicatively coupled to one or more other of the nodes 102. Such communicative coupling can include one or more of wired or wireless communication. In the embodiment, the nodes 102 each maintain at least a portion of a “ledger” of all transactions in the blockchain. In this manner, the ledger would be a distributed ledger. A transaction processed by a node that affects the ledger is verifiable by one or more of the other nodes such that the integrity of the ledger is maintained.

As for which nodes 102 can communicate with which other nodes, it can be sufficient that each of the nodes in the example blockchain network 100 are able to communicate with one or more other of the nodes 102 such that a message that is passed between nodes can propagate throughout the example blockchain network 100 (or some significant portion of it), assuming that the message is one that the blockchain protocol indicates should be forwarded. One such message might be the publication of a proposed transaction by one of the nodes 102, such as node 102A, which would then propagate along a path such as a path 106. Another such message might be the publication of a new block proposed for inclusion onto a blockchain.

In an embodiment, at least some of the nodes 102 are miner nodes that perform complex calculations, such as solving cryptographic problems. A miner node that solves the cryptographic problem creates a new block for the blockchain and broadcasts the new block to others of the nodes 102. The others of the nodes 102 verify the work of the miner node and, upon verification, accept the block into the blockchain (e.g., by adding it to the distributed ledger of the blockchain). In some examples, a block is a group of transactions, often marked with a timestamp and a “fingerprint” (e.g., a hash) of the previous block. In this manner, each block may become linked to a previous block, thereby creating the “chain” that links the blocks in the blockchain. In embodiments, valid blocks are added to the blockchain by a consensus of the nodes 102. Also in some examples, a blockchain comprises a list of validated blocks.

In an embodiment, at least some of the nodes 102 operate as validating nodes that validate transactions as described in the present disclosure. In some examples, a transaction includes data that provides proof of ownership of a digital asset (e.g., a number of

Bitcoins) and conditions for accepting or transferring ownership/control of the digital asset. In some examples, a “unlocking transaction” refers to a blockchain transaction that reassociates (e.g., transferring ownership or control) at least a portion of a digital asset, indicated by an unspent transaction output (UTXO) of a previous transaction, to an entity associated with a blockchain address. In some examples, a “previous transaction” refers to a blockchain transaction that contains the UTXO being referenced by the unlocking transaction. In some embodiments, the transaction includes a “locking script” that encumbers the transaction with conditions that must be fulfilled before ownership/control can be transferred (“unlocked”).

In some embodiments, the blockchain address is a string of alphanumeric characters that is associated with an entity to which control of at least a portion of a digital asset is being transferred/reassociated. In some blockchain protocols implemented in some embodiments, there is a one-to-one correspondence between a public key associated with the entity and the blockchain address. In some embodiments, validation of transactions involves validating one or more conditions specified in a locking script and/or unlocking script. Upon successful validation of the transaction 104, the validation node adds the transaction 104 to the blockchain and distributes it to the nodes 102.

FIG. 2 is a swim diagram that illustrates an example of a process that, if performed by a client computer system and a worker computer system, allows the client to verify work performed by the worker using a proof it and the Verification Key VK in accordance with an embodiment. Some or all of a process 200 (or any other processes described, or variations and/or combinations of those processes) can be performed under the control of one or more computer systems configured with executable instructions and/or other data, and may be implemented as executable instructions executing collectively on one or more processors. The executable instructions and/or other data can be stored on a non-transitory computer-readable storage medium (e.g., a computer program persistently stored on magnetic, optical, or flash media).

For example, some or all of process 200 can be performed by one or more computing devices (e.g., by a server in a data centre, by a client computing device, by multiple computing devices in a distributed system of a computing resource service provider, or by any suitable electronic client device such as the computing device 600 of FIG. 6).

In various embodiments, the client computer system submits a calculation to be performed by the worker computer system. The worker computer system may not be fully trusted by the client computer system, and therefore, the worker computer system provides information that allows the client computer system or another trusted verification computer system to verify that the calculation performed by the worker computer system is correct. In many examples, the client does not fully trust the worker computer system, and therefore, in order to satisfy the client computer system, the worker computer system submits information that allows the client computer system to prove that the computation was performed correctly. In some embodiments, verification of the work performed by the worker computer system is performed by a verifying computer system that is trusted by the client computer system.

In various embodiments, public verification key parameters VK, the proof π, and the I/O data are used to verify the alleged proof of correct computation provided by an untrusted worker computer system. In various embodiments, a verifying computer system gathers materials used in the verification process from a client computer system and the untrusted worker computer system, and performs the verification on the client computer system's behalf. In an embodiment, the verification of the computation performed by the untrusted worker computer system occurs during validation of a transaction and therefore the verifying compute system can be any bitcoin node or blockchain node.

The process begins at block 202 with a client computer system identifying a function to be evaluated by the worker computer system. At block 204, the client computer system constructs an evaluation key EK for the function submitted to the worker computer system. At block 206, the client computer system generates a verification key VK that can be used to verify the work performed by the worker computer system. At block 208, the client computer system submits the function and evaluation key EK to the worker computer system.

In an embodiment, the construction of the public evaluation key EK is accomplished as follows.

Public Evaluation Key E K = { r v v i ( s ) α v r v v i ( s ) r w w i ( s ) α w r w w i ( s ) r y y i ( s ) α y r y y i ( s ) ( r v β v i ( s ) + r w β w i ( s ) + r y β y i ( s ) ) s j } i = N + 1 m j = 0 deg ( t )

In the above embodiment, i represents the index to the internal wires of the circuit, deg(t) is the degree of the polynomial t(x), and deg(t) is equal to the number of multiplication gates in the circuit. For the circuit shown in FIG. 3, the public evaluation key EK is as follows:

Public Evaluation Key E K = { r v v 5 ( s ) r v v 6 ( s ) α v r v v 5 ( s ) α v r v v 6 ( s ) r w w 5 ( s ) r w w 6 ( s ) α w r w w 5 ( s ) α w r w w 6 ( s ) r y y 5 ( s ) r y y 6 ( s ) α y r y y 5 ( s ) α y r y y 6 ( s ) ( r v β v 5 ( s ) + r w β w 5 ( s ) + r y β y 5 ( s ) ) ( r v β v 6 ( s ) + r w β w 6 ( s ) + r y β y 6 ( s ) ) s 0 s 1 s 2 s 3 }

At block 210, the worker computer system receives the evaluation key EK and information describing the function to be performed from the client computer system. The worker computer system evaluates the function requested by the client computer system and constructs 212 a proof π that can be used to verify the calculation performed by the worker computer system. At block 214, the worker computer system provides the proof π and the I/O data of the calculation to the client computer system. In an embodiment, the I/O data is the input and outputs of the function being evaluated by the worker computer system.

At block 216, the client computer system receives the I/O data and the proof π from the worker computer system. At block 218, the client computer system verifies the computation performed by the worker computer system using elements from VK, π, and the I/O data.

Note that one or more of the operations performed in 202-218 may be performed in various orders and combinations, including in parallel.

Note that, in the context of describing disclosed embodiments, unless otherwise specified, use of expressions regarding executable instructions (also referred to as code, applications, agents, etc.) performing operations that “instructions” do not ordinarily perform unaided (e.g., transmission of data, calculations, etc.) denote that the instructions are being executed by a machine, thereby causing the machine to perform the specified operations.

In a paper titled “Quadratic Span Programs and Succinct NIZKs without PCPs” by Gennaro, R. et al. (2013), a protocol for verifiable computation based on quadratic arithmetic programs is described. In the protocol, a circuit takes as input n elements and produces an output of n′ elements for a total of N=n+n′ IO elements (or I/O data). The circuit can be viewed as a set of multiplication and addition gates where the circuit contains m wires connected to d multiplication gates, and addition gates are modelled with their contributions to the multiplication gates.

For the verifying entity to prove that an assignment (a1, a2, . . . , aN) on input/output wires is valid, it suffices to prove that there exists coefficients (aN+1, . . . , am) corresponding to assignment on the internal wires, such that the polynomial p(x) has roots (x1, x2, . . . , xd), i.e. p(xi)i=1 . . . d=0. The polynomial p(x) encodes the gate equations and the wire values. Therefore, a polynomial exists h(x) where p(x)=h(x)·t(x), where t(x)=Πi=1d(x−xi).

If Q=({vi}i=0m, {wi}i=0m, {yi}i=0m, t), to prove that t divides p=(Σi=0mai·vi(x))·(Σi=0mai·wi(x))−(Σi=0mai·yi(x)), the prover computes the quotient polynomial

h ( x ) = p ( x ) t ( x )

in an unknown point s and uses bilinear maps to check that p(s)=t(s)·h(s). In various examples, additional verification is performed to ensure that the worker computer system incorporates the input (a1, a2, . . . , an) correctly, and that the worker computer system generates the proof using the client's evaluation key EK.

Where =(x1, . . . , xd) is the set of selected root values, the polynomials ({vi}i=0m, {wi}i=0m, {yi}i=0m) can be expressed as a summation of Lagrange polynomials, i.e.

v i ( x ) = Π j = 1 , j i d ( x - x j ) ( x i - x j ) .

For generators =1 and Q=2, the verification key VK generated using random rv, rw, ry=rv·rw, s, αv, αw, αy, β, γ ∈ *r is:

Public Verification Key V K = { Q α v Q α w Q α w α y Q β β Q r y t ( s ) r v v i ( s ) r w w i ( s ) Q r y y i ( s ) } i = 0 …N

The proof contains the following elements:

Proof = { i = N + 1 m a i r v v i ( s ) i = N + 1 m a i α v r v v i ( s ) i = N + 1 m a i r w w i ( s ) Q i = N + 1 m a i α w r w w i ( s ) i = N + 1 m a i r y y i ( s ) i = N + 1 m a i α y r y y i ( s ) i = N + 1 m a i ( r v β v i ( s ) + r w β w i ( s ) + r y βy i ( s ) ) i = 0 d h i s i Q }

In an embodiment where VK, π, and (a1, a2, . . . , aN), the verifying computer system verifies that t(x) divides p(x) and hence (xN+1, . . . , xm)=f (x0, . . . , x N) as follows. First the verifying computer system checks the three a terms by confirming that:


evrvvmid(s), Q)=e(rvvmid(s), αvQ)   [1]


ewrwWmid(s), Q)=ew, rwvmid(s)Q)   [2]


e(αyryYmid(s), Q)=e(ryYmid(s), αyQ)   [3]

where Vmid(s)=Σi=N+1maivi(s), Wmid(s)=Σi=N+1maiwi(s), and Ymid(s)=Σi=N+1maiyi(s). Then, the verifying computer system checks the term β by confirming that:


e(rvVmid(s)+ryYmid(s), βQe(β, rwWmid(s)Q)=e(Zmid(s), Q)   [4]

    • and Zmid(s)=Σi=N+1mai(rvβvi(s)+rwβwi(s)+ryβyi(s)).

In addition, the verifier confirms that the divisibility requirement is satisfied by confirming that:


e(rvV(s), rwW(s)Q)=e(ryY(s), Q)·e(ryt(s), h(s)Q)   [5]

    • where rvV(s)=Σi=0mrvaivi(s), rwW(s)Q=Σi=0mrwaiw(s)Q, ryY(s)=Σi=0mryaiy(s), and h(s)Q=Σi=0dhiQ.

FIG. 3 illustrates an example of a circuit that represents an arithmetic function in accordance with an embodiment. The circuit shown in FIG. 3 represents the function 302:


f(a1, a2, a3, a4)=a1+a2a3(a3+a4)

In the circuit, each wire value comes from, and all operations are performed over, a prime field order field =r. The polynomials are defined in terms of their evaluation at three multiplication gates 304, 308, and 312. Addition gates 306 and 310 are modelled with their contributions to the multiplication gates. The circuit produces an output value 314.

When input values a1, a2, a3, a4 are assigned to the circuit, the worker computer system determines corresponding output values. For example, on input a1, . . . , a4 r, the worker evaluates the circuit to obtain the set (a5, a6, a7) which corresponds to the output value of each multiplication gate 304, 308, and 312 (a5, a6, a7 r). A dummy input wire a0 which is set to 1 is added to the circuit. For each multiplication gate 304, 308, and 312 in the circuit, distinct root values x5, x6, x7 r are chosen. Thus, for the circuit show in FIG. 3, we randomly select three values x5, x6,

and set the target polynomial t(x) to:


t(x)=(x−x5)(x−x6)(x−x7)

In an embodiment, polynomials {vi(x)} represent the left inputs of the multiplication gates, polynomials {wi(x)} represent the right inputs of the multiplication gates, and polynomials {yi(x)} represent the output values of the circuit. For the example circuit show in FIG. 3, the explicit expressions of the polynomials {vi(x)}, {wi(x)}, {yi (x)} are as follows:

Left input polynomials {vi(x)}

v 0 ( x ) = ( x - x 5 ) ( x - x 6 ) ( x 7 - x 5 ) ( x 7 - x 6 ) v 1 ( x ) = v 3 ( x ) = v 4 ( x ) = v 6 ( x ) = v 7 ( x ) = 0 v 2 ( x ) = ( x - x 6 ) ( x - x 7 ) ( x 5 - x 6 ) ( x 5 - x 7 ) v 5 ( x ) = ( x - x 5 ) ( x - x 7 ) ( x 6 - x 5 ) ( x 6 - x 7 )

Right input polynomials {wi(x)}

w 0 ( x ) = w 2 ( x ) = w 5 ( x ) = w 7 ( x ) = 0 w 1 ( x ) = ( x - x 5 ) ( x - x 6 ) ( x 7 - x 5 ) ( x 7 - x 6 ) w 3 ( x ) = ( x - x 6 ) ( x - x 7 ) ( x 5 - x 6 ) ( x 5 - x 7 ) + ( x - x 5 ) ( x - x 7 ) ( x 6 - x 5 ) ( x 6 - x 7 ) w 4 ( x ) = ( x - x 5 ) ( x - x 7 ) ( x 6 - x 5 ) ( x 6 - x 7 ) w 6 ( x ) = ( x - x 5 ) ( x - x 6 ) ( x 7 - x 5 ) ( x 7 - x 6 )

Output polynomials {yi (x)}

y 0 ( x ) = y 1 ( x ) = y 2 ( x ) = y 3 ( x ) = y 4 ( x ) = 0 y 5 ( x ) = ( x - x 6 ) ( x - x 7 ) ( x 5 - x 6 ) ( x 5 - x 7 ) y 6 ( x ) = ( x - x 5 ) ( x - x 7 ) ( x 6 - x 5 ) ( x 6 - x 7 ) y 7 ( x ) = ( x - x 5 ) ( x - x 6 ) ( x 7 - x 5 ) ( x 7 - x 6 )

In an embodiment, and Q are generators of 1 and 2 such that =1 and Q=2. In addition, we consider asymmetric pairing, i.e. 12, and 1=E(p)[r] (resp. 2=E(pk)[r]) are taken as the (order-r) subgroup of E(p) (resp. E(pk)). The key generation procedure includes random elements:

    • rv, rw, s, av, aw, ay, β,

where ry=rv·rw.

In the example illustrated in FIG. 3, the public verification key VK may be determined as:

Public Verification Key V k = { Q α v Q α w Q α w α y Q β βQ r y t ( s ) r v v 0 ( s ) r v v 1 ( s ) r v v 2 ( s ) r v v 3 ( s ) r v v 4 ( s ) r v v 7 ( s ) r w w 0 ( s ) Q r w w 1 ( s ) Q r w w 2 ( s ) Q r w w 3 ( s ) Q r w w 4 ( s ) Q r w w 7 ( s ) Q r y y 0 ( s ) r y y 1 ( s ) r y y 2 ( s ) r y y 3 ( s ) r y y 4 ( s ) r y y 7 ( s ) }

In an embodiment, the public verification key is implemented as a sequence of bits having subsequences each representing different components, although different ways of encoding the components into the public verification key are considered as being within the scope of the present disclosure.

The proof π contains the following elements:

Proof = { a 5 r v v 5 ( s ) + a 6 r v v 6 ( s ) a 5 α v r v v 5 ( s ) + a 6 α v r v v 6 ( s ) a 5 r w w 5 ( s ) Q + a 6 r w w 6 ( s ) Q a 5 α w r w w 5 ( s ) + a 6 α w r w w 6 ( s ) a 5 r y y 5 ( s ) + a 6 r y y 6 ( s ) a 5 α y r y y 5 ( s ) + a 6 α y r y y 6 ( s ) a 5 ( r v β v 5 ( s ) + r w β w 5 ( s ) + r y β y 5 ( s ) ) + a 6 ( r v β v 6 ( s ) + r w β w 6 ( s ) + r y β y 6 ( s ) ) h 0 Q + h 1 s Q + h 2 s 2 Q + h 3 s 3 Q }

Where (h0, h1, h2, h3) are the coefficients of the polynomial h(x) evaluated by the worker, and h(x)=h0+h1x+h2x2+h3x3. In an embodiment, the proof is implemented as a sequence of bits having subsequences each representing different components of the proof, although different ways of encoding the components into the proof are considered as being within the scope of the present disclosure. The set of elements x belongs to the public evaluation key EK.

χ = { r v v i ( s ) α v r v v i ( s ) r w w i ( s ) Q α w r w w i ( s ) r y y i ( s ) α y r y y i ( s ) ( r v β v i ( s ) + r w β w i ( s ) + r y β y i ( s ) ) s Q s 2 Q s 3 Q } i = ( 5 , 6 )

In an embodiment, the following equations are used for verifying an alleged proof π. Given the verification key VK, a proof π, and the IO values ai={a0, a1, a2, a3, a4, a7}, the verification algorithm first checks that rvVmid(s), rwWmid(s)Q, and ryYmid(s) are constructed using elements from the evaluation key EK. That is, the protocol first verifies the following equations (1) to (3)

e ( α v r v V mid ( s ) , Q ) = e ( r v V mid ( s ) , α v Q ) V mid ( s ) = i = ( 5 , 6 ) a i v i ( s ) α v r v V mid ( s ) = a 5 α v r v v 5 ( s ) + a 6 α v r v v 6 ( s ) r v V mid ( s ) = a 5 r v v 5 ( s ) + a 6 r v v 6 ( s ) ( 1 ) e ( α w r w W mid ( s ) , Q ) = e ( α w , r w W mid ( s ) Q ) W mid ( s ) = i = ( 5 , 6 ) a i w i ( s ) α w r w W mid ( s ) = a 5 α w r w w 5 ( s ) + a 6 α w r w w 6 ( s ) r w W mid ( s ) Q = a 5 r w w 5 ( s ) Q + a 6 r w w 6 ( s ) Q ( 2 ) e ( α y r y Y mid ( s ) , Q ) = e ( r y Y mid ( s ) , α y Q ) Y mid ( s ) = i = ( 5 , 6 ) a i y ( s ) α y r y Y mid ( s ) = a 5 α y r y y 5 ( s ) + a 6 α y r y y 6 ( s ) r y Y mid ( s ) = a 5 r y y 5 ( s ) + a 6 r y y 6 ( s ) ( 3 )

Secondly, the verifying computer system checks that the same coefficients amid={a5, a6} are used in Vmid(s), Wmid(s)Q, and Ymid(s). In an embodiment, the verifying computer system accomplishes this by verifying equation (4) below.

e ( r v V mid ( s ) + r y Y mid ( s ) , βQ ) · e ( β , r w W mid ( s ) Q ) = e ( Z mid ( s ) , Q ) Z mid ( s ) = i = ( 5 , 6 ) a i ( r v β v i ( s ) + r w β w i ( s ) + r y β y i ( s ) ) = a 5 ( r v β v 5 ( s ) + r w β w 5 ( s ) + r y β y 5 ( s ) ) + a 6 ( r v β v 6 ( s ) + r w β w 6 ( s ) + r y β y 6 ( s ) ) ( 4 )

In addition, the verifying computer system combines the terms from the commitments to perform the divisibility check on the proof term h(x). Namely, the verifying computer system proves that

t ( s ) · h ( s ) = ( i = 0 7 a i v i ( s ) ) · ( i = 0 7 a i w i ( s ) ) - ( i = 0 7 a i y i ( s ) )

by confirming the following.

e ( r v V ( s ) , r w W ( s ) Q ) = e ( r y Y ( s ) , Q ) · e ( r y t ( s ) , h ( s ) Q ) r v V ( s ) = i = 0 7 r v a i v i ( s ) r w W ( s ) Q = i = 0 7 r w a i w ( s ) Q r y Y ( s ) = i = 0 7 r y a i y ( s ) h ( s ) Q = i = 0 3 h i Q ( 5 )

FIG. 4 is a flowchart that illustrates an example of a process that, if performed by a client computer system, determines a verification key VK in accordance with an embodiment. Some or all of a process 400 (or any other processes described, or variations and/or combinations of those processes) can be performed under the control of one or more computer systems configured with executable instructions and/or other data, and may be implemented as executable instructions executing collectively on one or more processors. The executable instructions and/or other data can be stored on a non-transitory computer-readable storage medium (e.g., a computer program persistently stored on magnetic, optical, or flash media).

For example, some or all of process 400 can be performed by one or more computing devices (e.g., by a server in a data centre, by a client computing device, by multiple computing devices in a distributed system of a computing resource service provider, or by any suitable electronic client device such as the computing device 600 of FIG. 6).

In various embodiments, the client computer system submits a calculation to be performed by a worker computer system. The worker computer system may not be fully trusted by the client computer system, and therefore, the worker computer system provides information that allows the client computer system or another trusted verification computer system to verify that the calculation performed by the worker computer system is correct. In many examples, the client does not fully trust the worker computer system, and therefore, in order to satisfy the client computer system, the worker computer system provides information to the client computer system that allows the client computer system to prove that the computation performed by the worker computer system was correct. In various embodiments, public verification key parameters VK, the proof π, and the I/O data are used to verify the alleged proof of correct computation provided by the worker computer system. The flowchart 400 illustrates a process for generating the verification key VK.

In an embodiment, at block 402, the client computer system identifies a function F to be performed by an untrusted worker computer system. The function F takes n values as input. The client computer system generates a model of a circuit corresponding to the function, where the circuit is comprised of a set of multiplication gates and addition gates. At block 404, the client computer system identifies the multiplication gates in the circuit.

In an embodiment, at block 406, the client computer system randomly chooses root values that correspond to the output of each multiplication gate in the circuit. In a circuit that has m multiplication gates, the client computer system chooses m root values (xn+1 . . . xn+m).

In an embodiment, at block 408, the client computer system determines a target polynomial t(x)=(x-xn)(x-xn+1) . . . (x-xn+m) corresponding to the circuit using the chosen root values (xn+1 . . . xn+m). At block 410, the client computer system determines the left inputs of the multiplication gates {vi(x)}, the right inputs of the multiplication gates {wi(x)}, and output values {yi(x)} of the multiplication gates.

In an embodiment, at block 412, the client computer system selects random elements for degeneration rv,rw,s,av,aw,ay,β,γ from a field of prime order r such that ry=•rw.

In an embodiment, at block 414, the client computer system determines the public verification key VK. Let and Q be generators of 1 and 2 such that =1 and Q=2. It should be noted that (i) we consider asymmetric pairing, i.e. 12 and (ii) i=E(p) [r] (resp. 2=E (pk)[r]) are taken as the (order-r) subgroup of E(p) (resp. E(pk)). Given generators =1 and Q=2, the verification key VK generated using random rv, rw, ry=rv·s, av, aw, ay, β,γ ∈ r is as follows:

Public Verification Key V K = { Q α v Q α w Q α w α y Q β β Q r y t ( s ) r v v i ( s ) r w w i ( s ) Q r y y i ( s ) } i = 0 …N

Note that one or more of the operations performed in 202-214 may be performed in various orders and combinations, including in parallel.

Note that, in the context of describing disclosed embodiments, unless otherwise specified, use of expressions regarding executable instructions (also referred to as code, applications, agents, etc.) performing operations that “instructions” do not ordinarily perform unaided (e.g., transmission of data, calculations, etc.) denote that the instructions are being executed by a machine, thereby causing the machine to perform the specified operations.

FIG. 5 is a flowchart that illustrates an example of a process that, if performed by a client computer system, verifies a computation performed by a worker computer system using Proof π in accordance with an embodiment. Some or all of a process 500 (or any other processes described, or variations and/or combinations of those processes) can be performed under the control of one or more computer systems configured with executable instructions and/or other data, and may be implemented as executable instructions executing collectively on one or more processors. The executable instructions and/or other data can be stored on a non-transitory computer-readable storage medium (e.g., a computer program persistently stored on magnetic, optical, or flash media).

For example, some or all of process 500 can be performed by one or more computing devices (e.g., by a server in a data centre, by a client computing device, by multiple computing devices in a distributed system of a computing resource service provider, or by any suitable electronic client device such as the computing device 600 of FIG. 6).

In various embodiments, the client computer system submits a calculation to be performed by a worker computer system. The worker computer system may not be fully trusted by the client computer system, and therefore, the worker computer system provides information that allows the client computer system or another trusted verification computer system to verify that the calculation performed by the worker computer system is correct. In many examples, the client does not fully trust the worker computer system, and therefore, in order to satisfy the client computer system, the worker computer system provides information to the client computer system that allows the client computer system to prove that the computation performed by the worker computer system was correct. In various embodiments, public verification key parameters VK, the proof π, and the I/O data are used to verify the alleged proof of correct computation provided by the worker computer system. The flowchart 500 illustrates a process for verifying the calculation performed by the worker computer system using the proof it provided by the worker computer system.

In an embodiment, at block 502, the client computer system receives the proof π and the I/O data from the worker computer system. The proof comprises the following:

Proof = { i = N + 1 m a i r v v i ( s ) i = N + 1 m a i α v r v v i ( s ) i = N + 1 m a i r w w i ( s ) Q i = N + 1 m a i α w r w w i ( s ) i = N + 1 m a i r y y i ( s ) i = N + 1 m a i α y r y y i ( s ) i = N + 1 m a i ( r v β v i ( s ) + r w β w i ( s ) + r y β y i ( s ) ) i = 0 d h i s i Q }

In an embodiment, at block 504, the client computer system begins the process of confirming that the work performed by the worker computer system is correct. The client computer system confirms that rvVmid(s)P,rwWmid(s)Q and ryYmid(s)P are constructed using elements from the evaluation key EK as follows:


vrvVmid(s), Q)=e(rvVmid(s), αvQ)


ewrwWmid(s), Q)=ew, rwWmid(s)Q)


eyryYmid(s), Q)=e(ryYmid(s), αyQ)

where Vmid(s)=Σi=N+1m=aivi(s) Wmid(s)=Σi=N+1maiwi(s), and Ymid(s)=Σi=N+1maiyi(s).

At block 506, the client computer system confirms that matching coefficients are used for Vmid(s)P, Wmid(s)Q and Ymid(s)P as follows:


e(rvVmid(s)+ryYmid(s), βQ)·e(β, rwWmid(s)Q)=e(Zmid(s), Q)

    • and Zmid(s)=Σi=N+1mai(rvβvi(s)+rwβwi(s) ryβyi(s)).

At block 508, the client computer system combines the terms from the commitments to perform the divisibility check on the proof term h(x) as follows:


e(rvV(s), rwW(s)Q)=e(ryY(s), Qe(ryt(s), h(s)Q)

    • where rvV(s)=Σi=0mrvaivi(s), rwW(s)Q=Σi=N+1maiw(s)Q, ryY(s)=Σi=0m(s), and h(s)Q=Σi=0dhiQ.

If the above checks are successful, the client computer system determines that the calculations performed by the worker computer system are correct and the results provided by the work computer system can be trusted by the client computer system.

Note that one or more of the operations performed in 502-508 may be performed in various orders and combinations, including in parallel.

Note that, in the context of describing disclosed embodiments, unless otherwise specified, use of expressions regarding executable instructions (also referred to as code, applications, agents, etc.) performing operations that “instructions” do not ordinarily perform unaided (e.g., transmission of data, calculations, etc.) denote that the instructions are being executed by a machine, thereby causing the machine to perform the specified operations.

The present document describes systems and methods that enhance and expand the capabilities of a blockchain. Various embodiments allow a user to securely list and exchange rights over a public blockchain, and to integrate nearly complete anonymous digital transactions. Various embodiments may be used to provide solutions to (i) the common reference string (CRS) and the worker's proof (it) storage problems, (ii) the interaction between the unlocking script and CRS, and the unlocking script and π.

Various embodiments may be used to provide a secure, compact representation of smart contracts: Smart contracts may follow formatting conventions using special languages such as the XML-derivative, FpML. Various embodiments may be used to outsource contract executions to untrusted parties, or to publicly verify the correctness of contract execution. Contract validations may not imply code re-execution. Computations may not be replicated by every node in the network. In some embodiments, proofs of honest execution are stored in the public blockchain and used for validation purposes.

FIG. 6 is an illustrative, simplified block diagram of a computing device 600 that can be used to practice at least one embodiment of the present disclosure. In various embodiments, the computing device 600 can be used to implement any of the systems illustrated and described above. For example, the computing device 600 can be configured for use as a data server, a web server, a portable computing device, a personal computer, or any electronic computing device. As shown in FIG. 6, the computing device 600 could include one or more processors 602 that, in embodiments, communicate with and are operatively coupled to a number of peripheral subsystems via a bus subsystem 604. In some embodiments, these peripheral subsystems include a storage subsystem 606 comprising a memory subsystem 608 and a file/disk storage subsystem 610, one or more user interface input devices 612, one or more user interface output devices 614, and a network interface subsystem 616. Such storage subsystem 606 could be used for temporary or long-term storage of information.

In some embodiments, the bus subsystem 604 provides a mechanism for enabling the various components and subsystems of computing device 600 to communicate with each other as intended. Although the bus subsystem 604 is shown schematically as a single bus, alternative embodiments of the bus subsystem utilize multiple busses. In some embodiments, the network interface subsystem 616 provides an interface to other computing devices and networks. The network interface subsystem 616, in some embodiments, serves as an interface for receiving data from and transmitting data to other systems from the computing device 600. In some embodiments, the bus subsystem 604 is utilised for communicating data such as details, search terms, and so on.

In some embodiments, the user interface input devices 612 includes one or more user input devices such as a keyboard; pointing devices such as an integrated mouse, trackball, touchpad, or graphics tablet; a scanner; a barcode scanner; a touch screen incorporated into the display; audio input devices such as voice recognition systems, microphones; and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information to the computing device 600. In some embodiments, the one or more user interface output devices 614 include a display subsystem, a printer, or non-visual displays such as audio output devices, etc. In some embodiments, the display subsystem includes a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), light emitting diode (LED) display, or a projection or other display device. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from the computing device 600. The one or more user interface output devices 614 can be used, for example, to present user interfaces to facilitate user interaction with applications performing processes described and variations therein, when such interaction may be appropriate.

In some embodiments, the storage subsystem 606 provides a computer-readable storage medium for storing the basic programming and data constructs that provide the functionality of at least one embodiment of the present disclosure. The applications (programs, code modules, instructions), when executed by one or more processors in some embodiments, provide the functionality of one or more embodiments of the present disclosure and, in embodiments, are stored in the storage subsystem 606. These application modules or instructions can be executed by the one or more processors 602. In various embodiments, the storage subsystem 606 additionally provides a repository for storing data used in accordance with the present disclosure. In some embodiments, the storage subsystem 606 comprises a memory subsystem 608 and a file/disk storage subsystem 610.

In embodiments, the memory subsystem 608 includes a number of memories, such as a main random access memory (RAM) 618 for storage of instructions and data during program execution and/or a read only memory (ROM) 620, in which fixed instructions can be stored. In some embodiments, the file/disk storage subsystem 610 provides a non-transitory persistent (non-volatile) storage for program and data files and can include a hard disk drive, a floppy disk drive along with associated removable media, a Compact Disk Read Only Memory (CD-ROM) drive, an optical drive, removable media cartridges, or other like storage media.

In some embodiments, the computing device 600 includes at least one local clock 624. The local clock 624, in some embodiments, is a counter that represents the number of ticks that have transpired from a particular starting date and, in some embodiments, is located integrally within the computing device 600. In various embodiments, the local clock 624 is used to synchronize data transfers in the processors for the computing device 600 and the subsystems included therein at specific clock pulses and can be used to coordinate synchronous operations between the computing device 600 and other systems in a data centre. In another embodiment, the local clock is a programmable interval timer.

The computing device 600 could be of any of a variety of types, including a portable computer device, tablet computer, a workstation, or any other device described below.

Additionally, the computing device 600 can include another device that, in some embodiments, can be connected to the computing device 600 through one or more ports (e.g., USB, a headphone jack, Lightning connector, etc.). In embodiments, such a device includes a port that accepts a fibre-optic connector. Accordingly, in some embodiments, this device is that converts optical signals to electrical signals that are transmitted through the port connecting the device to the computing device 600 for processing. Due to the ever-changing nature of computers and networks, the description of the computing device 600 depicted in FIG. 6 is intended only as a specific example for purposes of illustrating the preferred embodiment of the device. Many other configurations having more or fewer components than the system depicted in FIG. 6 are possible.

The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. However, it will be evident that various modifications and changes may be made thereunto without departing from the scope of the invention as set forth in the claims. Likewise, other variations are within the scope of the present disclosure. Thus, while the disclosed techniques are susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific form or forms disclosed but, on the contrary, the intention is to cover all modifications, alternative constructions and equivalents falling within the scope of the invention, as defined in the appended claims.

The use of the terms “a” and “an” and “the” and similar referents in the context of describing the disclosed embodiments (especially in the context of the following claims) is to be construed to cover both the singular and the plural, unless otherwise indicated or clearly contradicted by context. The terms “comprising”, “having”, “including”, and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to”) unless otherwise noted. The term “connected”, when unmodified and referring to physical connections, is to be construed as partly or wholly contained within, attached to or joined together, even if there is something intervening. Recitation of ranges of values in the present disclosure are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range unless otherwise indicated and each separate value is incorporated into the specification as if it were individually recited. The use of the term “set” (e.g., “a set of items”) or “subset”, unless otherwise noted or contradicted by context, is to be construed as a nonempty collection comprising one or more members. Further, unless otherwise noted or contradicted by context, the term “subset” of a corresponding set does not necessarily denote a proper subset of the corresponding set, but the subset and the corresponding set may be equal.

Conjunctive language, such as phrases of the form “at least one of A, B, and C”, or “at least one of A, B and C”, unless specifically stated otherwise or otherwise clearly contradicted by context, is otherwise understood with the context as used in general to present that an item, term, etc., could be either A or B or C, or any nonempty subset of the set of A and B and C. For instance, in the illustrative example of a set having three members, the conjunctive phrases “at least one of A, B, and C” and “at least one of A, B and C” refer to any of the following sets: {A}, {B}, {C}, {A, B}, {A, C}, {B, C}, {A, B, C}. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of A, at least one of B and at least one of C each to be present.

Operations of processes described can be performed in any suitable order unless otherwise indicated or otherwise clearly contradicted by context. Processes described (or variations and/or combinations thereof) can be performed under the control of one or more computer systems configured with executable instructions and can be implemented as code (e.g., executable instructions, one or more computer programs or one or more applications) executing collectively on one or more processors, by hardware or combinations thereof. In some embodiments, the code can be stored on a computer-readable storage medium, for example, in the form of a computer program comprising a plurality of instructions executable by one or more processors. In some embodiments, the computer-readable storage medium is non-transitory.

The use of any and all examples, or exemplary language (e.g., “such as”) provided, is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.

Embodiments of this disclosure are described, including the best mode known to the inventors for carrying out the invention. Variations of those embodiments will become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate and the inventors intend for embodiments of the present disclosure to be practiced otherwise than as specifically described. Accordingly, the scope of the present disclosure includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the scope of the present disclosure unless otherwise indicated or otherwise clearly contradicted by context. All references, including publications, patent applications, and patents, cited are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety.

It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the invention as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The word “comprising” and “comprises”, and the like do not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. In the present specification, “comprises” means “includes or consists of” and “comprising” means “including or consisting of”. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a device claim enumerating several means, several of these means can be embodied by one and the same item of hardware.

The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Summary

Techniques described and suggested in the present disclosure improve the field of computing, specifically the field of confirming the correctness of a computation performed by a third party computer system, by verifying a proof π provided by the 3rd party using a public verification key parameter VK and I/O data. Additionally, techniques described and suggested in the present disclosure improve the functioning of computing systems by allowing computations to be distributed across a network of untrusted 3rd party computer systems. Moreover, techniques described and suggested in the present disclosure are necessarily rooted in computer technology in order to overcome problems specifically arising with verifying performance of a digital contract by modeling a contract as a logical circuit.

Claims

1. A computer-implemented method comprising:

providing a task to a set of independent computer systems which are able to compete to provide outcome of the provided task, the task specifying a computation to perform; and
verifying, at a verifying computer system, that the computation is correctly performed by a worker computer system in the set of independent computer systems, the computation based on a circuit having a set of multiplication gates, by at least: generating an evaluation key; providing the evaluation key to the worker computer system; receiving a proof from the worker computer system, the proof based at least in part on the evaluation key; generating a verification key; and verifying that the computation is correct using the proof and the verification key.

2. The computer-implemented method claimed in claim 1, wherein the verification key is based on inputs to the set of multiplication gates and outputs of the set of multiplication gates.

3. The computer-implemented method claimed in claim 1, wherein the proof is based at least in part on a set of intermediate outputs of the set of multiplication gates.

4. The computer-implemented method claimed in claim 1, wherein the proof is based at least in part on a public evaluation key.

5. The computer-implemented method claimed in claim 1, wherein the proof and the verification key are based at least in part on a first generator and a second generator that generate different groups.

6. The computer-implemented method claimed in claim 1, further comprising verifying that elements of the proof are consistent with elements of the evaluation key.

7. The computer-implemented method claimed in claim 1, further comprising verifying that elements of the proof are constructed using matching coefficients.

8. The computer-implemented method claimed in claim 1, further comprising verifying a divisibility requirement on a term of the proof.

9. The computer-implemented method claimed in claim 1, wherein the worker computer system provides a set of I/O values corresponding to input and output values of the circuit.

10. The computer-implemented method claimed in claim 1, wherein the circuit includes one or more addition gates which are modelled with their contributions to the multiplication gates.

11. The computer-implemented method claimed in claim 1, wherein the computation is part of a bitcoin transaction validation.

12. The computer-implemented method claimed in claim 1, wherein verifying that the computation is correct is accomplished by at least:

providing the proof, the verification key, and a set of I/O values to a verification computer system; and
receiving an indication from the verification computer system that the computation is correct.

13. The computer-implemented method claimed in claim 1, wherein the verification computer system is a blockchain node.

14. A system, comprising:

a processor; and
memory including executable instructions that, as a result of being executed by the processor, causes the system to perform the computer-implemented method of claim 1.

15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause the computer system to at least perform the computer-implemented method of claim 1.

16. A system, comprising:

a processor; and
memory including executable instructions that, as a result of being executed by the processor, causes the system to perform the computer-implemented method of claim 2.

17. A system, comprising:

a processor; and
memory including executable instructions that, as a result of being executed by the processor, causes the system to perform the computer-implemented method of claim 3.

18. A system, comprising:

a processor; and
memory including executable instructions that, as a result of being executed by the processor, causes the system to perform the computer-implemented method of claim 4.

19. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause the computer system to at least perform the computer-implemented method of claim 2.

20. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause the computer system to at least perform the computer-implemented method of claim 3.

Patent History
Publication number: 20210192514
Type: Application
Filed: Nov 1, 2018
Publication Date: Jun 24, 2021
Inventors: Alexandra COVACI (Canterbury), Simone MADEO (London), Patrick MOTYLINSKI (London), Stephane VINCENT (Luxembourg)
Application Number: 16/762,490
Classifications
International Classification: G06Q 20/40 (20060101); H04L 9/32 (20060101); H04L 9/06 (20060101);